SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Checklist 178: Another Coronavirus Checklist

The world is changing so fast that it can be hard to keep up. This week on the Checklist, we’ll take a look at how life is going to be different in the weeks and months ahead — and what you can do to stay safe, productive … and happy.

Security and privacy in a pandemicCybersecurity for remote workersTips from two decades of working at homeWorst-case scenario preparedness

Keeping your data locked down

The current Covid-19 pandemic is a global crisis, and public and private sector organizations are responding accordingly. In the United …

Read Listen

Checklist 177: The Coronavirus Checklist

This Checklist is all about Covid-19, the severe new form of coronavirus which has recently reached pandemic status. We’ll cover several safety issues related to the virus — both digital and physical

Read Listen

The Checklist 175: Certified Good for a Limited Time

On this week’s Checklist, we’ll talk about Apple’s moves to improve web security. We’ll look at what Google is doing to make downloads safer. And last but not least, we’ll give you a quick intro to data breach prevention.

Read Listen

Checklist 174: Building a Safer Nest

This week on the Checklist, we’ll start off with a big list of tips to keep your iPhone safe and happy … and then we’ll take a new look at Google’s Nest smart home devices.

Read Listen

Checklist 172: A Ring of Trouble

On this week’s Checklist, we’ll revisit the issues with Amazon’s Ring, take another look at iCloud backups, and hit the highlights from Apple’s latest round of OS updates.

Read Listen

Checklist 171: Here, FIDO!

On this week’s Checklist, we’ll see how private your iCloud backups really are; we’ll examine the strange story of how the richest person in the world got hacked; and finally, we’ll look at a technology that promises a better way to do 2FA.

This week on the Checklist:

Considering iCloud and end-to-end encryptionA WhatsApp bromance gone badIf you’ve got an iPhone, here’s FIDO!

 
What happens in your iCloud…

We’ve known for a while that iCloud backup data isn’t protected by end-to-end encryption — meaning that encryption keys aren’t stored only on the user’s device, …

Read Listen

Checklist 170: A Great Big List + Home Insecurity

On this week’s Checklist, we’ll take a look at someone else’s checklist of security tips, plus we’ll talk about what happens when companies that don’t specialize in security decide to get into the security business.

Read Listen

Checklist 169: New Year, New Rules!

It’s the first Checklist of 2020, and we’re starting things off with some important privacy news from the great state of California. We’ll also discuss (another) potential issue with Amazon’s Ring doorbell surveillance camera. And finally, we’ll leave you with a decidedly low-tech security tip that you’ll want to remember all year long!

Read Listen

Best of the Checklist: January 2nd, 2019

The Checklist is taking a little holiday break this week, but we’ll be back on the 9th of January with a new podcast. Until then, we’d like to invite you to check out these classic Checklists you might have missed, especially as they touch on topics that have been in the news of late! 

In what follows, we’ll let you know what’s been going on in the world of cybersecurity for the past week, and then we’ll point you to a Checklist where you can learn more.

This Best of the Checklist …

Read Listen

Checklist 168: It only FEELS like a recap

This week’s Checklist topics may sound familiar, but don’t be fooled! We revisit three stories that we’ve talked about before, but which now have some updates worth discussing (spoiler: it’s not all good news!).

On this week’s Checklist, it’s deja vu all over again:

$20 bucks and a security breach on pump four…revisitedLast week’s Communications Limits…revisitedBad passwords…revisited (again)

$20 on four: the case for paper money

Earlier in the year, we covered a story about gas station monitoring software that had serious vulnerabilities — serious enough to attract the attention of the Department of …

Read Listen

Checklist 165: Safe shopping for the holidays

This week’s Checklist gets you ready for the seasonal shopping rush (from a cybersecurity perspective, anyway). We’ll show you how to keep safe as you shop online; what gifts you might want to avoid; and how to make sure everything arrives as planned; and what to do when all the madness is over! 

This week’s Checklist covers:

How to shopWhat (not) to buyDeliveries and checkups

Shop smart, shop safe

Before you actually purchase anything online, there are a couple of basic precautions you should take — and one or two seasonal threats you need …

Read Listen

Checklist 164: Over the River and Through the Woods

A a complete guide to how to keep yourself safe during the holiday travel season. We’ll tell you what to do before you even walk out the door, how to protect yourself while you’re traveling, and what things to bear in mind when you reach your destination.

Read Listen

Checklist 162: Insecurity with a “light” touch

On this week’s Checklist, we’ll talk about a privacy issue with a privacy service. We’ll look at how social engineering works in practice by examining “SIM-swapping”. And we’ll check out a high-tech hacking story that reads like something out of a Hollywood thriller.

Here’s the Checklist for this week:

Taking the privacy out of VPNSIM-swapping 101An audio hack with a “light” touch

When VPNs go public

As many as 2,000 users of the popular VPN service Nord VPN may have had their accounts compromised in a credential stuffing attack.

Credential stuffing refers to the practice …

Read Listen

Checklist 161: The Fixes Are In (Again)

This week on the Checklist, we’ll catch you up on what Apple has been doing to keep you safe. We’ll talk about some adware apps that got the boot from the App Store. And finally, we’ll look at the cybersecurity implications of Catholicism 2.0.

This week’s Checklist covers:

A look at the security bits of this week’s Apple updatesAdware violating apps kicked out of the App StoreDo rosary beads really need an app? Really?

To opt in, or to opt out, that is the question…

This week, Apple released a bevy of updates for …

Read Listen
1 9 10 11 12 13 19

Get the latest security news and deals